Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches

FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches

Posted on April 24, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a severe security breach involving a federal agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software. The breach, which occurred in September 2025, involved a malware known as FIRESTARTER, a backdoor facilitating unauthorized remote access and control.

CISA, in collaboration with the UK’s National Cyber Security Centre (NCSC), has assessed that FIRESTARTER is being used in a widespread campaign by an advanced persistent threat (APT) group. This campaign exploits patched vulnerabilities in Cisco’s ASA firmware, specifically targeting CVE-2025-20333 and CVE-2025-20362, to gain unauthorized access.

Persistent Threat of FIRESTARTER

FIRESTARTER poses a significant risk by maintaining its presence on compromised Cisco devices even after security patches are applied. The malware uses a post-exploitation toolkit called LINE VIPER, which enables threat actors to execute system commands, capture network packets, and bypass authentication protocols.

This toolkit allows attackers to suppress security logs and execute arbitrary commands, ensuring continued access. By embedding itself into the device’s boot sequence, FIRESTARTER can survive firmware updates and device reboots, except in cases of a hard power cycle.

Technical Analysis and Impact

FIRESTARTER’s resilience is enhanced by its ability to manipulate the startup sequence of the device, reactivating with every system reboot. It shares similarities with a previously identified bootkit known as RayInitiator. CISA warns that even though Cisco has patched the vulnerabilities, the backdoor remains unless the device undergoes a complete reimaging.

Cisco is monitoring the exploitation activities linked to these vulnerabilities under the designation UAT4356, also known as Storm-1849. The company stresses the need for complete reimaging and upgrading of compromised devices to eliminate the backdoor’s persistence mechanism.

Response and Mitigation Strategies

To mitigate the threat, Cisco recommends a cold restart of the affected devices, as simple reboot commands are ineffective. Pulling and reinserting the power cord is necessary to remove the implant. Meanwhile, the broader cybersecurity community is advised to remain vigilant, as the origins of these attacks, reportedly linked to China, continue to pose significant challenges.

State-sponsored groups like Volt Typhoon have been leveraging covert networks of compromised routers and IoT devices to conduct espionage and complicate attribution efforts. These botnets enable low-cost, low-risk cyber operations, further emphasizing the need for robust network security measures.

The continued evolution of these tactics highlights the importance of comprehensive cybersecurity strategies to defend against sophisticated threats targeting critical infrastructure worldwide.

The Hacker News Tags:APT, APT actors, Cisco, Cisco Firepower, CVE-2025-20333, CVE-2025-20362, cyber threat, Cybersecurity, Firestarter, LINE VIPER, Malware, network security, network vulnerability, security patches, Threat Actors

Post navigation

Previous Post: Claude Desktop Raises Privacy Concerns with Browser Integration
Next Post: Udemy Targeted in Alleged Data Breach by Hacker Group

Related Posts

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication The Hacker News
Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks The Hacker News
6M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More The Hacker News
U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack The Hacker News
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto The Hacker News
[Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR [Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Udemy Targeted in Alleged Data Breach by Hacker Group
  • FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches
  • Claude Desktop Raises Privacy Concerns with Browser Integration
  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Udemy Targeted in Alleged Data Breach by Hacker Group
  • FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches
  • Claude Desktop Raises Privacy Concerns with Browser Integration
  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark